Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

More Complete, More Specific Thanks to Layered Aproach

By Bill Zalud
March 12, 2002
It’s a different world all right. “Since September 11th, our corporate and commercial customers—who used to be concerned primarily with perimeter protection—are now interested in safeguarding the entire environment,” points out Jerry Boggess, president of Tyco Fire & Security, in an exclusive interview with SECURITY. In a wide-ranging discussion, the Tyco executive proposed end users re-evaluate their security and life safety plans with a “layered look.” “Corporate executives are seeking more comprehensive solutions within each security layer. And if their protective measures are at one level today, they are looking to move up at least to the next level.” Of course, security has been evolv- ing for a long time before last fall.

“Security has changed dramatically over the past decade,” says Boggess. “We’ve gone from a guard system to a disparate system of components to today’s integrated, layering effect. This way, one system builds upon the next to provide a security network that protects an entire business, not just its parts.”

Fire & Detection

Layering fits neatly into the Tyco Fire & Security profile. That operation, with $10 billion in sales last year, employs 95,000 and offers equipment and services in brands including ADT, Sensormatic, Robot, Software House, Simplex-Grinnell, Ansul and Scott Technologies, among others.

The layering bot- tom line, according to Boggess: prevention, detection, notification and suppression.

The foundation layer, and one required by code or insurance, includes fire alarm and burglar alarm systems.

“Equipment here covers contacts, glass breaks, motion and heat sensors as well as smoke detectors and carbon monoxide detectors,” says the Tyco Fire and Security president.

Suppression

Upon that fire and detection layer, there’s fire suppression equipment. The gear here includes fire extinguishers, sprinkler systems, gas and foam suppression and exit notification systems. Across all types of organizations, there is more life safety concern, in the aftermath of the September 11th attacks. Unique technology also is finding its way into the layering equation. For example, the Eagle Imager thermal camera from Scott Health & Safety contains such advanced technology its sensor can detect temperature differences to one-tenth of a degree, permitting clearer, sharper images. Hot spots and victims can be detected as close as two feet away and up to 600 feet away. With its ability to detect very minute temperature differences, firefighters can “see” victims through thick smoke and darkness, according to Boggess.

Video Surveillance

Beyond suppression, the next security layer is video surveillance, comments the Tyco executive. There is a strong installed base out there. Much of it is analog. But “video surveillance is rapidly becoming a totally digital operation. For example, Sensormatic’s Intellex Digital Video Management System allows a user to digitally record surveillance cameras and then instantly search for information using a variety of parameters such as time, date, camera, motion or change in lighting. And with the appropriate software, it is possible to share this video with any corporate officer or security professional with access to a computer on the company’s local area or wide area network.”

According to Boggess, more and more cameras are being purchased and installed, “even in markets that we thought were saturated.”

Access Control

Another layer on top of the others is electronic access control systems that includes card entry, badging and hands-free exit systems, as well as a range of biometrics.

Boggess sees some recent twists on the typical access control system, in the fallout from September 11th. “There are more security executives seeking better ways to control access into their facilities by temporary visitors, as well as ways to better handle packages and deliveries.” The Tyco executive also sees more interest in biometrics, although his firm continues to evaluate and find advantages in a diversity of biometric technologies. No doubt, “rapid growth in the use of biometric devices as part of an access control system will continue at least for the next few years.” For example, according to the Tyco executive, Ireland-based CEM Systems has integrated iris scan technology into its Access 2000 system now in use in more than 20 British Telecommunications sites in Northern Ireland, as well as a number of airports in the United Kingdom.

Personal Protection

A final layer is one that some security executives may not have explored as completely as the others—until now. The personal protection layer, at least to Boggess, covers gear and technology as varied as gas masks and personal response devices, wearable pendants that call help at the press of a button.

Within the Tyco family, Scott Health & Safety has developed and manufactures self-contained breathing apparatus, air-purifying devices and gas/vapor monitoring instruments. “Military operations and post offices around the world are buying these products in huge numbers,” adds Boggess.

Central Monitoring

Holding the layers together and taking security to yet another level is central monitoring. Concludes Boggess, “Through the use of a central monitoring station, each of the security layers can be monitored to provide a higher level of protection.”

A properly monitored system can be an effective force in preventing any variety of incidents. And security professionals—as well as the security equipment itself—are available to handle notification and instructions to get employees out of harm’s way as quickly as possible, as well as alert proper authorities to take action if necessary.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Changing the Hoodie Image for Cybersecurity

    No More Hoodies: Why We Need to Attract More Women to Cyber

    See More
  • How to Build a Complete Access Control System

    See More
  • Poor Sister No More: Access Enters Spotlight, Again

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • into to sec.jpg

    Introduction to Security, 10th Edition

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing